ITEC 1001 - quiz 5 - networking, information systems, and security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

_________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

Coaxial

Power failures are the primary cause of component failure in computer systems.

False

Social engineering is a form of hacking that has a social or political agenda behind it.

False

_________ computers are ones that have multiple hardware systems performing the same task at the same time.

Redundant

_________ is a type of malware which is designed to report activity on your computer to another party.

Spyware

_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

Strong

A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Trojan horse

A VPN employs a method called ''tunneling'' in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.

True

A threat is anything that can cause harm while a vulnerability is a weakness that has not been protected against threats.

True

An MIS system can provide different types of information or summaries to managers at different levels.

True

A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

access point

Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.

True

Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.

True

The network that connects the computers in a school's study center or library is considered a LAN.

True

Today, the NIC hardware is integrated into a computer's motherboard and in network-ready printers.

True

With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.

True

Any step you take to ward off a threat is called a:

countermeasure

A(n) _________ is a central repository that contains stored or archived data gathered from multiple databases.

data warehouse

A(n) _________ examines and blocks Internet traffic in order to protect your private network.

firewall

While storms could be a cause, power _________ are more likely to be caused by disturbances from high-demand equipment in a home or building.

fluctuations

In the early days of computing, a _________ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do.

hacker

Today, a _________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

hacker

A(n) _________ is a connection point in a network.

node

A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

virus

A _________ is used to prevent attenuation when packets are traveling long distances.

repeater


संबंधित स्टडी सेट्स

BOARD PRACTICE QUESTIONS - HEAD, EYES, EARS, NOSE, AND THROAT REVIEW

View Set

Identify the Control & Experimental Groups

View Set

Legal Environment of Business Test 3 (Ch. 17, 20, and 21)

View Set

History Ch. 11 Roman Empire (This is my NOTES so if something is on here that is not on the test I will miss it to and PLZ don't tell me if I have something wrong unless it is major!)

View Set

WG.4 North America Cultural Landscape and Economics

View Set

Object Oriented Programming Concepts, using C#

View Set